Loading...

Simulation-based traceability analysis of RFID authentication protocols

Alagheband, M. R ; Sharif University of Technology

445 Viewed
  1. Type of Document: Article
  2. DOI: 10.1007/s11277-013-1552-7
  3. Abstract:
  4. Nowadays low-cost RFID systems have moved from obscurity into mainstream applications which cause growing security and privacy concernsThe lightweight cryptographic primitives and authentication protocols are indispensable requirements for these devices to grow pervasiveIn recent years, there has been an increasing interest in intuitive analysis of RFID protocolsThis concept has recently been challenged by formal privacy modelsThis paper investigates how to analyse and solve privacy problems in formal modelFirst, we highlight some vague drawbacks especially in forward and backward traceability analysis and extend it in the simulation-based privacy model familyThen, the privacy weaknesses of three new-found RFID authentication protocols are analysed in formal privacy models and three improved protocols are proposed to prevent the aforementioned attacks
  5. Keywords:
  6. Authentication protocol ; Authentication ; Internet of things ; Authentication protocols ; Cryptographic primitives ; Forward and backward ; Privacy models ; RFID authentication protocols ; RFID systems ; Traceability ; Traceability analysis ; Formal concept analysis
  7. Source: Wireless Personal Communications ; Vol. 77, Issue. 2 , 2014 , pp. 1019-1038
  8. URL: http://link.springer.com/article/10.1007%2Fs11277-013-1552-7